Identity and Access Management

Identity and Access Management

SaaS Application Deep Dive June 2016 Aaron Smalser, Program Manager Jeevan Desarda, Program Manager Azure Active Directory Premium Agenda Module Module Module Module Dive Module Module

1 2 3 4 Overview Application Types & Concepts Scenarios & Requirements SaaS Application Technical Deep 5 Troubleshooting 6 Drive Usage Module 1 Overview Overview

Overview Key Capabilities User Experience Business Value The big picture Customers Partners Azure Public cloud Windows Server Active Directory

Onpremises Microsoft Azure Active Directory A modern identity management system spanning cloud and onpremises, providing federation, identity management, device registration, user provisioning, application access control & data protection. Cloud BYO

Cloud app security problem How do I secure and manage user access to cloud apps, and implement single sign on in my organization? Azure Cloud Microsoft Azure Active Directory Your Custo m App

Other third party app Solution: Azure Active Directory Extends Active Directory into the cloud Enables single sign-on to cloud apps using standardized protocols like SAML 2.0, OpenID Connect, and OAuth 2.0 Supports automatic provisioning, deprovisioning, and life cycle management of user accounts for popular apps, using API connectors and

standardized protocols like Office 365 Other MSFT Apps ISV App Azure AD AD ISV App Your

Custom App Integration with SaaS Apps Key Capabilities Easy integration to many of todays popular SaaS applications unified user experience security centralized application access management unified

reporting and monitoring IT Pro User Experience Guided experience for enabling SSO to apps Manage user access and entitlements in the cloud Enable Conditional Access and MFA per application End User Authentication Experience Single Identity for all

applications Web based portal for viewing and launch all assigned apps Only need to remember password for their single organizational identity Same authentication experience for all the applications Users can still access known URLs or bookmarked URLs to

launch apps You will not be prompted for username and password for domain joined machine on Windows 10 Integration with SaaS apps Business Value Quickly configure your SaaS application for single sign-on and easier user account management. Convenie

nt Easily publish onpremises web apps via Application Proxy and /or Custom apps through a rich standards-based platform. 2600+ popular SaaS apps Per application conditional access policies and real time access monitoring for added security. Risks can be mitigated based on the variety of available actions. Inclusive Protected

Azure integration with SaaS Apps Read More toolbox Azure integration with SaaS apps Review TechNet Azure integration with SaaS apps Watch Channel 9 Azure integration with SaaS apps- Videos/ Demos 2016 2015 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Recently Viewed Presentations

  • Personal Statements - Pre-Medical and Pre-Dental Office

    Personal Statements - Pre-Medical and Pre-Dental Office

    Personal Statements. Presented by the UConn Pre-Medical/Dental Center. and the University Writing Center . By: Christopher Iverson . Assistant Director, University Writing Center ... Provides a more complete picture of you than test scores or a resume/CV can. Shows what...
  • Writing Robust SAS Macros Yan Qiao Principle Programmer,

    Writing Robust SAS Macros Yan Qiao Principle Programmer,

    To make the simple example ROBUST… Function: Create a data set containing duplicates of an input data set. This is almost the complement of PROC SORT NODUPKEY- it throws away all records having a unique key.
  • Text Features -

    Text Features -

    TEXT FEATURES Be sure to take notes! * EXTERNAL MEANS "ON THE OUTSIDE" EXTERNAL TEXT FEATURES ARE EASY TO SEE BECAUSE THEY ARE ON THE OUTSIDE. In order to help a reader understand decide if it is a book they...
  • Tools for Analyzing DES and TDES

    Tools for Analyzing DES and TDES

    Customizable S-Boxes GUI with all intermediate results Text report of the settings and encryption process Parallel execution of encryption (for comparison) TDES : Graphical overview of the algorithm DES : All the steps (initial permutation, p-box permutation, etc) are implemented...
  • Analogies


    * * * * * * * Analogies test your ability to: Recognize the relationship between the words in a word pair Recognize when two word pairs display equal relationships To complete an analogy you must be able to: Select...
  • Grounded Theory -

    Grounded Theory -

    No Theory Yes Interview/ Observation Theoretical Coding Select-ive Coding Open Coding Substant-ive Coding Grounded Theory Coding Glaser (1978) describes two types of grounded theory codes, substantive and theoretical: There are basically two types of codes to generate: substantive and theoretical.
  • Constructing and Characterizing Covert Channels on GPGPUs

    Constructing and Characterizing Covert Channels on GPGPUs

    Constructing and Characterizing . Covert Channels on GPGPUs. ... Atomic Operations: Rely on atomic units that are limited in number >> possible to cause measurable contention. ... Constructing and Characterizing Covert Channels on GPGPUs
  • The Cone-Gatherers

    The Cone-Gatherers

    The Cone-Gatherers Chapter 1